News

Speculative plan can run code on runners and expose cloud credentials. Learn how tokens are abused and how to lock it down ...
TL;DR Introduction Windows thumbnail cache, or thumbcache, is a well-known forensic artifact, but often one that is ...
Making mistakes when complying with ETSI 303 645 ...
We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user ...
TL;DR The Problem You’ve done a build review on a host and need to get files from a host, or need to access an application, ...
TL;DR   Introduction I’ve been advising on cyber risk in the insurance sector for over a decade. It still surprises me how ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
Third-party plugins are often the security Achilles heel of Content Management Systems (CMS). It seems like not a month goes by without one security researcher or another uncovers a vulnerability in a ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
Over the last year of looking at kids GPS tracking watches we have found some staggering issues. With these devices it almost seems that having multiple security issues is the new normal. While ...